BUG: soft lockup in __perf_sw_event (2)

7 views
Skip to first unread message

syzbot

unread,
Jul 22, 2021, 7:36:24 PM7/22/21
to syzkaller-a...@googlegroups.com
Hello,

syzbot found the following issue on:

HEAD commit: 53af79bc8d35 ANDROID: ABI: update symbols to unisoc whitel..
git tree: android12-5.4
console output: https://syzkaller.appspot.com/x/log.txt?x=12b739ca300000
kernel config: https://syzkaller.appspot.com/x/.config?x=12fdca0186751701
dashboard link: https://syzkaller.appspot.com/bug?extid=c2934e2a04c1e844de6e
compiler: Debian clang version 11.0.1-2, GNU ld (GNU Binutils for Debian) 2.35.1

Unfortunately, I don't have any reproducer for this issue yet.

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+c2934e...@syzkaller.appspotmail.com

RBP: 00000000004bfcc4 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80
R13: 00007ffec206a05f R14: 00007fbb9aadc300 R15: 0000000000022000
watchdog: BUG: soft lockup - CPU#1 stuck for 123s! [syz-executor.0:8178]
Modules linked in:
CPU: 1 PID: 8178 Comm: syz-executor.0 Not tainted 5.4.125-syzkaller-00005-g53af79bc8d35 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:check_memory_region_inline mm/kasan/generic.c:175 [inline]
RIP: 0010:check_memory_region+0x1b/0x2e0 mm/kasan/generic.c:191
Code: d3 90 90 90 90 90 90 90 90 90 90 90 90 90 90 41 57 41 56 41 55 41 54 53 b0 01 48 85 f6 0f 84 fd 01 00 00 48 89 fb 48 c1 eb 2f <81> fb fe ff 01 00 0f 86 76 02 00 00 49 89 fc 49 c1 ec 03 49 b8 00
RSP: 0018:ffff8881b4d3eee8 EFLAGS: 00000a06 ORIG_RAX: ffffffffffffff13
RAX: 1ffff110369a7e01 RBX: 000000000001ffff RCX: ffffffff817b91d0
RDX: 0000000000000000 RSI: 0000000000000010 RDI: ffff8881b4d3f020
RBP: ffff8881b4d3f0d0 R08: ffffffff817b91a4 R09: ffffed103dd54e18
R10: ffffed103dd54e18 R11: 0000000000000000 R12: ffffffff817b91d0
R13: 0000000000000010 R14: ffff8881b4d3f020 R15: ffff8881ea745378
FS: 00007fbb9aadc700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000002014b1ff CR3: 00000001879d8000 CR4: 00000000001406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
memcpy+0x25/0x50 mm/kasan/common.c:123
memcpy_common kernel/events/internal.h:173 [inline]
__output_copy kernel/events/internal.h:177 [inline]
perf_output_read_group kernel/events/core.c:6347 [inline]
perf_output_read+0x1150/0x1480 kernel/events/core.c:6380
perf_output_sample+0x357/0x1e30 kernel/events/core.c:6422
__perf_event_output kernel/events/core.c:6749 [inline]
perf_event_output_forward+0x140/0x1b0 kernel/events/core.c:6763
__perf_event_overflow+0x1b9/0x340 kernel/events/core.c:8237
do_perf_sw_event kernel/events/core.c:8454 [inline]
___perf_sw_event+0x3cc/0x4c0 kernel/events/core.c:8485
__perf_sw_event+0x12e/0x220 kernel/events/core.c:8497
page_fault+0x2f/0x40 arch/x86/entry/entry_64.S:1203
RIP: 0010:fault_in_pages_readable include/linux/pagemap.h:603 [inline]
RIP: 0010:iov_iter_fault_in_readable+0x250/0x640 lib/iov_iter.c:426
Code: bb 49 81 c4 00 10 00 00 4d 31 fc bf 00 10 00 00 4c 89 e6 e8 b2 e9 3e ff 49 81 fc 00 10 00 00 73 47 0f 1f 00 0f ae e8 45 31 ed <41> 8a 1f 0f 1f 00 48 b8 00 00 00 00 00 fc ff df 41 8a 04 06 84 c0
RSP: 0018:ffff8881b4d3f880 EFLAGS: 00010246
RAX: 0000000000000002 RBX: 000000002014b200 RCX: 0000000000000002
RDX: ffff8881cbbf1f80 RSI: 00000000000003ff RDI: 0000000000001000
RBP: ffff8881b4d3f930 R08: ffffffff82266e5e R09: ffffed103b8752df
R10: ffffed103b8752df R11: 0000000000000000 R12: 00000000000003ff
R13: 0000000000000000 R14: 1ffff110369a7f1a R15: 000000002014b1ff
generic_perform_write+0x1ee/0x5a0 mm/filemap.c:3301
__generic_file_write_iter+0x239/0x480 mm/filemap.c:3440
ext4_file_write_iter+0x49e/0x10e0 fs/ext4/file.c:270
call_write_iter include/linux/fs.h:1976 [inline]
new_sync_write fs/read_write.c:483 [inline]
__vfs_write+0x5ec/0x780 fs/read_write.c:496
vfs_write+0x212/0x4e0 fs/read_write.c:558
ksys_write+0x186/0x2b0 fs/read_write.c:611
do_syscall_64+0xcb/0x1e0 arch/x86/entry/common.c:290
entry_SYSCALL_64_after_hwframe+0x44/0xa9
RIP: 0033:0x4665e9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fbb9aadc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9
RDX: 0000000000806013 RSI: 0000000020000200 RDI: 0000000000000005
RBP: 00000000004bfcc4 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80
R13: 00007ffec206a05f R14: 00007fbb9aadc300 R15: 0000000000022000
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0 skipped: idling at native_safe_halt arch/x86/include/asm/irqflags.h:60 [inline]
NMI backtrace for cpu 0 skipped: idling at arch_safe_halt arch/x86/include/asm/irqflags.h:103 [inline]
NMI backtrace for cpu 0 skipped: idling at default_idle+0x1f/0x30 arch/x86/kernel/process.c:572


---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

syzbot

unread,
Jul 23, 2021, 12:28:28 AM7/23/21
to syzkaller-a...@googlegroups.com
syzbot has found a reproducer for the following issue on:

HEAD commit: 53af79bc8d35 ANDROID: ABI: update symbols to unisoc whitel..
git tree: android12-5.4
console output: https://syzkaller.appspot.com/x/log.txt?x=15aecf12300000
kernel config: https://syzkaller.appspot.com/x/.config?x=12fdca0186751701
dashboard link: https://syzkaller.appspot.com/bug?extid=c2934e2a04c1e844de6e
compiler: Debian clang version 11.0.1-2, GNU ld (GNU Binutils for Debian) 2.35.1
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=11a54bca300000
C reproducer: https://syzkaller.appspot.com/x/repro.c?x=13a415f8300000

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+c2934e...@syzkaller.appspotmail.com

watchdog: BUG: soft lockup - CPU#1 stuck for 123s! [syz-executor637:1287]
Modules linked in:
CPU: 1 PID: 1287 Comm: syz-executor637 Not tainted 5.4.125-syzkaller-00005-g53af79bc8d35 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:__pvclock_read_cycles arch/x86/include/asm/pvclock.h:87 [inline]
RIP: 0010:pvclock_clocksource_read+0x137/0x6b0 arch/x86/kernel/pvclock.c:76
Code: f6 d9 48 89 ea 48 d3 ea 89 c1 48 d3 e5 84 c0 48 0f 48 ea 48 89 5c 24 68 48 89 e8 48 f7 64 24 68 48 0f ac d0 20 48 89 44 24 50 <49> 8d 6f 07 4c 89 f8 48 c1 e8 03 42 0f b6 04 30 84 c0 0f 85 c1 02
RSP: 0018:ffff8881e1106e18 EFLAGS: 00000a06 ORIG_RAX: ffffffffffffff13
RAX: 0000015328eeb211 RBX: 00000000de9bd9d2 RCX: 00000000000000ff
RDX: 0000000000000153 RSI: ffffffff86e3d05c RDI: ffffffff86e3d05d
RBP: 0000018608a0fcec R08: ffffffff86e3d048 R09: ffffffff86e3d058
R10: ffffffff86e3d043 R11: 1ffffffff0dc7a08 R12: 000000000000000c
R13: ffffffff86e3d040 R14: dffffc0000000000 R15: ffffffff86e3d050
FS: 00007fb0cfbed700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000500000001 CR3: 00000001e1be1000 CR4: 00000000001406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
kvm_clock_read arch/x86/kernel/kvmclock.c:89 [inline]
kvm_sched_clock_read+0x15/0x40 arch/x86/kernel/kvmclock.c:101
paravirt_sched_clock arch/x86/include/asm/paravirt.h:22 [inline]
sched_clock+0x36/0x40 arch/x86/kernel/tsc.c:245
sched_clock_cpu+0x18/0x390 kernel/sched/clock.c:371
local_clock include/linux/sched/clock.h:84 [inline]
cpu_clock_event_update kernel/events/core.c:9698 [inline]
cpu_clock_event_read+0x17/0x50 kernel/events/core.c:9731
perf_output_read_group kernel/events/core.c:6341 [inline]
perf_output_read+0xf5f/0x1480 kernel/events/core.c:6380
perf_output_sample+0x357/0x1e30 kernel/events/core.c:6422
__perf_event_output kernel/events/core.c:6749 [inline]
perf_event_output_forward+0x140/0x1b0 kernel/events/core.c:6763
__perf_event_overflow+0x1b9/0x340 kernel/events/core.c:8237
do_perf_sw_event kernel/events/core.c:8454 [inline]
___perf_sw_event+0x3cc/0x4c0 kernel/events/core.c:8485
__perf_sw_event+0x12e/0x220 kernel/events/core.c:8497
page_fault+0x2f/0x40 arch/x86/entry/entry_64.S:1203
RIP: 0010:fault_in_pages_readable include/linux/pagemap.h:603 [inline]
RIP: 0010:iov_iter_fault_in_readable+0x250/0x640 lib/iov_iter.c:426
Code: bb 49 81 c4 00 10 00 00 4d 31 fc bf 00 10 00 00 4c 89 e6 e8 b2 e9 3e ff 49 81 fc 00 10 00 00 73 47 0f 1f 00 0f ae e8 45 31 ed <41> 8a 1f 0f 1f 00 48 b8 00 00 00 00 00 fc ff df 41 8a 04 06 84 c0
RSP: 0018:ffff8881e1107880 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 00000000200e8200 RCX: 0000000000000000
RDX: ffff8881e13bbf00 RSI: 00000000000003ff RDI: 0000000000001000
RBP: ffff8881e1107930 R08: ffffffff82266e5e R09: ffffed103b731909
R10: ffffed103b731909 R11: 0000000000000000 R12: 00000000000003ff
R13: 0000000000000000 R14: 1ffff1103c220f1a R15: 00000000200e81ff
generic_perform_write+0x1ee/0x5a0 mm/filemap.c:3301
__generic_file_write_iter+0x239/0x480 mm/filemap.c:3440
ext4_file_write_iter+0x49e/0x10e0 fs/ext4/file.c:270
call_write_iter include/linux/fs.h:1976 [inline]
new_sync_write fs/read_write.c:483 [inline]
__vfs_write+0x5ec/0x780 fs/read_write.c:496
vfs_write+0x212/0x4e0 fs/read_write.c:558
ksys_write+0x186/0x2b0 fs/read_write.c:611
do_syscall_64+0xcb/0x1e0 arch/x86/entry/common.c:290
entry_SYSCALL_64_after_hwframe+0x44/0xa9
RIP: 0033:0x4465c9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 a1 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fb0cfbed308 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 00000000004cb4e8 RCX: 00000000004465c9
RDX: 0000000000806013 RSI: 0000000020000200 RDI: 0000000000000005
RBP: 00000000004cb4e0 R08: 0000000000000012 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00000000004cb4ec
R13: 000000000049b140 R14: 6573755f75706372 R15: 0000000000022000

Reply all
Reply to author
Forward
0 new messages